forensicshard

Drakosha Ali

hackerlab

Task: Modified Kali Linux ISO with encrypted flag file and hidden AES key. Solution: Timestamp analysis to find all modified files, extract AES key/IV from custom kernel module description field, decrypt flag with AES-128-CBC.

$ ls tags/ techniques/
iso_integrity_checkmd5_verificationsquashfs_extractiontimestamp_filteringkernel_module_stringsaes128_cbc_decryption

🔒

Permission denied (requires tier.pro)

Sign in to access full writeups

Create a free account with GitHub, then upgrade to Pro.

$ssh [email protected]